Portfolio Security Portfolio Security will mean any security owned by the Fund.
Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.
E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.
General Authority of the Collateral Agent By acceptance of the benefits of this Agreement and any other Collateral Documents, each Secured Party (whether or not a signatory hereto) shall be deemed irrevocably (a) to consent to the appointment of the Collateral Agent as its agent hereunder and under such other Collateral Documents, (b) to confirm that the Collateral Agent shall have the authority to act as the exclusive agent of such Secured Party for the enforcement of any provisions of this Agreement and such other Collateral Documents against any Grantor, the exercise of remedies hereunder or thereunder and the giving or withholding of any consent or approval hereunder or thereunder relating to any Collateral or any Grantor’s obligations with respect thereto, (c) to agree that it shall not take any action to enforce any provisions of this Agreement or any other Collateral Document against any Grantor, to exercise any remedy hereunder or thereunder or to give any consents or approvals hereunder or thereunder except as expressly provided in this Agreement or any other Collateral Document and (d) to agree to be bound by the terms of this Agreement and any other Collateral Documents.
RATIFICATION OF INTELLECTUAL PROPERTY SECURITY AGREEMENT Borrower hereby ratifies, confirms, and reaffirms, all and singular, the terms and conditions of the IP Agreement and acknowledges, confirms and agrees that the IP Agreement contains an accurate and complete listing of all Intellectual Property.
Authority of the Company To carry out its purposes, the Company, consistent with and subject to the provisions of this Agreement and applicable law, is empowered and authorized to do any and all acts and things incidental to, or necessary, appropriate, proper, advisable, or convenient for, the furtherance and accomplishment of its purposes.
Valid Security Interest This Agreement creates a valid and continuing security interest (as defined in the applicable UCC) in the Sold Property in favor of the Issuer, which is prior to all other Liens, other than Permitted Liens, and is enforceable against creditors of and purchasers from the Depositor.
Credit Union Lien and Security Interest To the extent you owe the Credit Union money as a borrower, guarantor, indorser or otherwise, the Credit Union has a lien on any or all of the funds in any account in which you have an ownership interest at the Credit Union, regardless of the source of the funds. The Credit Union may apply these funds in any order to pay off your indebtedness without further notice to you. If the Credit Union chooses not to enforce its lien, the Credit Union does not waive its right to enforce the lien at a later time. In addition, you grant the Credit Union a consensual security interest in your accounts and agree the Credit Union may use the funds from your accounts to pay any debt or amount owed the Credit Union, except obligations secured by your dwelling, unless prohibited by applicable law. All accounts are nonassignable and nontransferable to third parties.
Password Security You are responsible for maintaining adequate security and control of any and all User IDs, Passwords, hints, personal identification numbers (PINs), or any other codes that you use to access the Account. Do not discuss, compare, or share information about your account number or password unless you are willing to give them full use of your money. Any loss or compromise of the foregoing information and/or your personal information may result in unauthorized access to your Account by third-parties and the loss or theft of any funds held in your Account and any associated accounts, including your Account. Checks and electronic withdrawals are processed by automated methods, and anyone who obtains your account number or access device could use it to withdraw money from your account, with or without your permission. You are responsible for keeping your email address and telephone number up to date in order to receive any notices or alerts that we may send you. We assume no responsibility for any loss that you may sustain due to compromise of your account login credentials due to no fault of ours and/or your failure to follow or act on any notices or alerts that we may send to you. If you believe your Account information has been compromised, or that someone has transferred or may transfer money from your account without your permission, contact us immediately, through Synapse, at xxxx@xxxxxxxxx.xxx or call at +0(000) 000-0000. You agree to promptly review all Account and transaction records and other Communications that we make available to you and to promptly report any discrepancy to us.
Property of the Company (i) Except as otherwise provided herein, all lists, records and other non-personal documents or papers (and all copies thereof) relating to the Company and/or any of its subsidiaries or divisions, including such items stored in computer memories, on microfiche or by any other means, made or compiled by or on behalf of the Employee, or made available to the Employee, are and shall be the property of the Company, and shall be delivered to the Company on the date of termination of the Employee's employment with the Company, or sooner upon request of the Company at any time or from time to time. (ii) All inventions, including any procedures, formulas, methods, processes, uses, apparatuses, patterns, designs, plans, drawings, devices or configurations of any kind, any and all improvements to them which are developed, discovered, made or produced, and all trade secrets and information used by the Company and/or its subsidiaries and divisions (including, without limitation, any such matters created or developed by the Employee during the term of this Agreement), shall be the exclusive property of the Company or the subject subsidiary, and shall be delivered to the Company or the subject subsidiary (without the Employee retaining any copies, components or records thereof) on the date of termination of the Employee's employment with the Company; provided, however, that nothing herein contained shall be deemed to grant to the Company any property rights in any inventions or other intellectual property which may at any time be developed by the Employee which is wholly unrelated to any business then engaged in or under development by the Company.